Cisco N5K-C5010P-BF Troubleshooting Guide - Page 132

CLI rejects feature-group removal, AAA, User cannot login through TACACS+ or RADIUS authentication - default password

Page 132 highlights

Chapter 6 Troubleshooting Security Issues AAA Send document comments to [email protected]. Solution NX-OS does not activate role configuration changes dynamically. You needs to log in again to have the configuration changes to the new role come into effect. CLI rejects feature-group removal The CLI rejects the no role feature-group name command when the administrator tries to delete a feature-group. Possible Cause A CLI error indicates that the feature group is in use, which means that it is included in one of the role configurations. Solution To address the error, perform the following steps: • Use the show role | egrep role:|feature-group command to display which feature group is associated with the role or under which role. • Detach the association with the no rule command within the role configuration mode, and then delete the feature group. AAA User cannot login through TACACS+ or RADIUS authentication With the server group properly configured for the Nexus 5000 switch and the server group is assigned the aaa authentication login default configuration on TACACS+ or RADIUS servers, the Telnet or SSH login fails to authenticate users with the following error: %TACACS-3-TACACS_ERROR_MESSAGE: All servers failed to respond Possible Cause AAA group is not configured with the correct VRF to access servers. Solution Perform the following steps to enable login: • Check which AAA group is being used for authentication with the show running-config aaa and show aaa authentication commands. • For TACACS+, check the VRF association with the AAA group with the show tacacs-server groups and show running-config tacacs+ commands. • For RADIUS, check the VRF association with the AAA group with the show radius-server groups and show running-config radius commands. • Correct the VRF association, then test the VRF setting with the test aaa group command. • If the test aaa command returns the error, "user has failed authentication", then the server is accessable but the credentials for the user account are incorrect. Verify that the user configuration is correct on the server. Cisco Nexus 5000 Series Troubleshooting Guide 6-4 OL-25300-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

Send document comments to [email protected].
6-4
Cisco Nexus 5000 Series Troubleshooting Guide
OL-25300-01
Chapter 6
Troubleshooting Security Issues
AAA
Solution
NX-OS does not activate role configuration changes dynamically. You needs to log in again to have the
configuration changes to the new role come into effect.
CLI rejects feature-group removal
The CLI rejects the
no role feature-group name
<group-name>
command when the administrator tries
to delete a feature-group.
Possible Cause
A CLI error indicates that the feature group is in use, which means that it is included in one of the role
configurations.
Solution
To address the error, perform the following steps:
Use the
show role | egrep role:|feature-group
command to display which feature group is
associated with the role or under which role.
Detach the association with the
no rule
command within the role configuration mode, and then
delete the feature group.
AAA
User cannot login through TACACS+ or RADIUS authentication
With the server group properly configured for the Nexus 5000 switch and the server group is assigned
the aaa authentication login default configuration on TACACS+ or RADIUS servers, the Telnet or SSH
login fails to authenticate users with the following error:
%TACACS-3-TACACS_ERROR_MESSAGE: All servers failed to respond
Possible Cause
AAA group is not configured with the correct VRF to access servers.
Solution
Perform the following steps to enable login:
Check which AAA group is being used for authentication with the
show running-config aaa
and
show aaa authentication
commands.
For TACACS+, check the VRF association with the AAA group with the
show tacacs-server
groups
and
show running-config tacacs+
commands.
For RADIUS, check the VRF association with the AAA group with the
show radius-server groups
and
show running-config radius
commands.
Correct the VRF association, then test the VRF setting with the
test aaa group
<name>
<username> <password>
command.
If the
test aaa
command returns the error, “user has failed authentication", then the server is
accessable but the credentials for the user account are incorrect. Verify that the user configuration
is correct on the server.